Access Authorization. The Contractor must have data access policies which implements the following:
Access Authorization. (1) iManage maintains an authorization management system designed to ensure that only authorized iManage Personnel (technical and non-technical) are granted access to systems containing Customer Data.
(2) All iManage Personnel accessing systems containing Customer Data have a separate, unique username. Deactivated and expired usernames are not recycled or otherwise granted to other individuals.
(3) iManage restricts access to Customer Data solely to iManage Personnel who have a need to access Customer Data in connection with the Cloud Services or as otherwise required by applicable Law.
Access Authorization. (i) CiteRight maintains an authorization management system designed to ensure that only authorized CiteRight Personnel (technical and non-technical) are granted access to systems containing Customer Data.
(ii) All CiteRight Personnel accessing systems containing Customer Data have a separate, unique username. Deactivated and expired usernames are not recycled or otherwise granted to other individuals.
(iii) CiteRight restricts access to Customer Data solely to CiteRight Personnel who have a need to access the Customer Data in connection with the CiteRight Services or as otherwise required by applicable Law.
Access Authorization i. The Data Importer maintains and updates a record of personnel authorized to access systems that contain customer data.
ii. The Data Importer deactivates authentication credentials of employees or contract workers immediately upon the termination of their employment or services as well as such authentication credentials that have not been used for a period of time not to exceed six months.
iii. The Data Importer identifies those personnel who may grant, alter or cancel authorized access to data and resources.
Access Authorization a. Acuity maintains and updates a record of personnel authorized to access Acuity systems that contain Customer Data.
b. Acuity deactivates authentication credentials that have not been used for a period of time not to exceed six months.
c. Acuity identifies those personnel who may grant, alter or cancel authorized access to data and resources.
d. Acuity ensures that where more than one individual has access to systems containing Customer Data, the individuals have separate identifiers/logins.
Access Authorization. A. Microsoft maintains and updates a record of personnel authorized to access Microsoft systems that contain Customer Data.
B. Microsoft deactivates authentication credentials that have not been used for a period of time not to exceed six months.
C. Microsoft identifies those personnel who may grant, alter or cancel authorized access to data and resources.
D. Microsoft ensures that where more than one individual has access to systems containing Customer Data, the individuals have separate identifiers/log-ins.
Access Authorization i. Cisco shall have user account creation and deletion procedures, with appropriate approvals, for granting and revoking access to Customer’s systems and networks. Cisco shall use an enterprise access control system that requires revalidation of its personnel by managers at regular intervals based on the principle of “least privilege” and need-to-know criteria based on job role.
ii. Cisco shall maintain and update a record of personnel authorized to access systems that con- tain Protected Data and Cisco shall review users’ access rights at regular intervals.
iii. For systems that process Protected Data, Cisco shall revalidate (or where appropriate, deac- tivate) access of users who change reporting structure and deactivate authentication creden- tials that have not been used for a period of time not to exceed six (6) months.
iv. Cisco shall restrict access to program source code and associated items such as software object code, designs, specifications, verification plans, and validation plans, in order to prevent the introduction of unauthorized functionality and to avoid unintentional changes.
Access Authorization. (i) Provider maintains and updates a record of personnel authorized to access systems that contain customer data.
(ii) Provider deactivates authentication credentials of employees or contract workers immediately upon the termination of their employment or services
Access Authorization. Business Associate shall implement policies and procedures for granting access to PHI. Business Associate will provide secure role-based account management granting privileges utilizing the principle of least privilege. Business Associate will monitor all user accounts with administrative level access to Operating Systems and databases used to create, receive, transmit, transact or store PHI. Business Associate will restrict the ability to install software to only authorized technical support personnel.
Access Authorization. To have access to the Services, you must have at least one eligible deposit or credit Account with the Bank. Access will be provided to the following types of consumer Account(s) (primarily for personal, family or household purposes) or business Account(s) through the Service:
(a) Checking;
(b) Savings;
(c) Money Market Deposit Account;
(d) Certificate of Deposit (CD);
(e) Installment Loan;
(f) Commercial Loan;
(g) Mortgage Loan; and